Lucene search

K

WordPress Bitcoin Payments – Blockonomics Security Vulnerabilities

cvelist
cvelist

CVE-2022-45805 WordPress Paytm Payment Gateway Plugin <= 2.7.3 is vulnerable to SQL Injection

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Paytm Paytm Payment Gateway paytm-payments allows SQL Injection.This issue affects Paytm Payment Gateway: from n/a through...

10AI Score

0.006EPSS

2023-11-03 12:18 PM
schneier
schneier

New York Increases Cybersecurity Rules for Financial Companies

Another example of a large and influential state doing things the federal government won't: Boards of directors, or other senior committees, are charged with overseeing cybersecurity risk management, and must retain an appropriate level of expertise to understand cyber issues, the rules say....

7.3AI Score

2023-11-03 11:01 AM
10
githubexploit
githubexploit

Exploit for Improper Authentication in Automattic Woocommerce Payments

WP-CVE-2023-28121 WooCommerce Payments &lt; 5.6.2 -...

9.8CVSS

7AI Score

0.924EPSS

2023-11-03 01:19 AM
300
githubexploit
githubexploit

Exploit for Unrestricted Upload of File with Dangerous Type in Royal-Elementor-Addons Royal Elementor Addons

WP-CVE-2023-5360 Royal Elementor Addons and Templates &lt;=...

9.8CVSS

9.7AI Score

0.911EPSS

2023-11-03 12:58 AM
387
nessus
nessus

Debian DSA-5546-1 : chromium - security update

The remote Debian 11 / 12 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-5546 advisory. Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious...

8.8CVSS

8.2AI Score

0.005EPSS

2023-11-03 12:00 AM
19
nessus
nessus

Microsoft Edge (Chromium) < 118.0.2088.88 / 119.0.2151.44 Multiple Vulnerabilities

The version of Microsoft Edge installed on the remote Windows host is prior to 118.0.2088.88 / 119.0.2151.44. It is, therefore, affected by multiple vulnerabilities as referenced in the November 2, 2023 advisory. Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability...

8.8CVSS

8.7AI Score

0.005EPSS

2023-11-03 12:00 AM
33
nessus
nessus

FreeBSD : chromium -- multiple vulnerabilities (a1e27775-7a61-11ee-8290-a8a1599412c6)

The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the a1e27775-7a61-11ee-8290-a8a1599412c6 advisory. Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a...

8.8CVSS

8.2AI Score

0.005EPSS

2023-11-03 12:00 AM
8
openvas

8.8CVSS

8.7AI Score

0.005EPSS

2023-11-03 12:00 AM
4
openvas

8.8CVSS

8.7AI Score

0.005EPSS

2023-11-03 12:00 AM
4
openvas

8.8CVSS

8.7AI Score

0.005EPSS

2023-11-03 12:00 AM
3
veracode
veracode

Cross-site Scripting (XSS)

chromium is vulnerable to Remote Code Execution (RCE). The vulnerability exists due to the inappropriate implementation in Payments, which allows an attacker to bypass XSS preventions via a malicious...

6.1CVSS

6.7AI Score

0.001EPSS

2023-11-02 09:55 PM
15
krebs
krebs

Russian Reshipping Service ‘SWAT USA Drop’ Exposed

The login page for the criminal reshipping service SWAT USA Drop. One of the largest cybercrime services for laundering stolen merchandise was hacked recently, exposing its internal operations, finances and organizational structure. Here's a closer look at the Russia-based SWAT USA Drop Service,...

6.5AI Score

2023-11-02 07:55 PM
25
mscve
mscve

Chromium: CVE-2023-5480 Inappropriate implementation in Payments

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more...

6.1CVSS

6.9AI Score

0.001EPSS

2023-11-02 07:00 AM
28
kaspersky
kaspersky

KLA61868 Multiple vulnerabilities in Microsoft Browser

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, spoof user interface. Below is a complete list of vulnerabilities: Use after free vulnerability in Side Panel can be exploited to cause...

8.8CVSS

8.8AI Score

0.005EPSS

2023-11-02 12:00 AM
11
debiancve
debiancve

CVE-2023-5480

Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity:...

6.1CVSS

5.3AI Score

0.001EPSS

2023-11-01 06:15 PM
35
nvd
nvd

CVE-2023-5480

Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity:...

6.1CVSS

6.3AI Score

0.001EPSS

2023-11-01 06:15 PM
1
osv
osv

CVE-2023-5480

Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity:...

6.1CVSS

4.7AI Score

0.001EPSS

2023-11-01 06:15 PM
3
cve
cve

CVE-2023-5480

Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity:...

6.1CVSS

6.1AI Score

0.001EPSS

2023-11-01 06:15 PM
135
prion
prion

Cross site scripting

Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity:...

6.1CVSS

6.2AI Score

0.001EPSS

2023-11-01 06:15 PM
13
cvelist
cvelist

CVE-2023-5480

Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity:...

6.5AI Score

0.001EPSS

2023-11-01 05:13 PM
3
ubuntucve
ubuntucve

CVE-2023-5480

Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity: High) Notes Author| Note ---|--- alexmurray | The Debian chromium source package is called chromium-browser in...

6.1CVSS

5.6AI Score

0.001EPSS

2023-11-01 12:00 AM
13
ibm
ibm

Security Bulletin: IBM Financial Transaction Manager v3.2.x is vulnerable to XML External Entity Injection (XXE)

Summary An XML External Entity Injection (XXE) vulnerability in Java based XML parsers within IBM Financial Transaction Manager was addressed. Vulnerability Details ** CVEID: CVE-2023-35892 DESCRIPTION: **IBM Financial Transaction Manager for SWIFT Services 3.2.4 is vulnerable to an XML External...

9.1CVSS

6.4AI Score

0.001EPSS

2023-10-31 01:44 PM
31
nessus
nessus

Google Chrome < 119.0.6045.105 Multiple Vulnerabilities

The version of Google Chrome installed on the remote Windows host is prior to 119.0.6045.105. It is, therefore, affected by multiple vulnerabilities as referenced in the 2023_10_stable-channel-update-for-desktop_31 advisory. Inappropriate implementation in Payments in Google Chrome prior to...

8.8CVSS

8.6AI Score

0.005EPSS

2023-10-31 12:00 AM
33
chrome
chrome

Stable Channel Update for Desktop

The Chrome team is delighted to announce the promotion of Chrome 119 to the stable channel for Windows, Mac and Linux. This will roll out over the coming days/weeks. Chrome 119.0.6045.105 (Linux and Mac), 119.0.6045.105/.106( Windows) contains a number of fixes and improvements -- a list of...

8.8CVSS

8.3AI Score

EPSS

2023-10-31 12:00 AM
121
kaspersky
kaspersky

KLA61760 Multiple vulnerabilities in Google Chrome

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, spoof user interface. Below is a complete list of vulnerabilities: Implementation vulnerability in Payments can be exploited to cause denial...

8.8CVSS

9.1AI Score

EPSS

2023-10-31 12:00 AM
19
freebsd
freebsd

chromium -- multiple vulnerabilities

Chrome Releases reports: This update includes 15 security fixes: [1492698] High CVE-2023-5480: Inappropriate implementation in Payments. Reported by Vsevolod Kokorin (Slonser) of Solidlab on 2023-10-14 [1492381] High CVE-2023-5482: Insufficient data validation in USB. Reported by DarkNavy on...

8.8CVSS

7.7AI Score

0.005EPSS

2023-10-31 12:00 AM
12
trellix
trellix

Trellix 2024 Threat Predictions

Trellix 2024 Threat Predictions By Trellix · October 30, 2023 Introduction This last year we have seen upheaval across the cybersecurity landscape. The need for effective, worldwide threat intelligence continues to grow as geopolitical and economic developments create an increasingly...

7AI Score

2023-10-30 12:00 AM
7
trellix
trellix

Trellix 2024 Threat Predictions

Trellix 2024 Threat Predictions By Trellix · October 30, 2023 Introduction This last year we have seen upheaval across the cybersecurity landscape. The need for effective, worldwide threat intelligence continues to grow as geopolitical and economic developments create an increasingly...

6.9AI Score

2023-10-30 12:00 AM
13
code423n4
code423n4

Minter can censor GATEKEEPER and mint uncollateralized for a prolonged period of time

Lines of code https://github.com/code-423n4/2023-10-ethena/blob/ee67d9b542642c9757a6b826c82d0cae60256509/contracts/EthenaMinting.sol#L277-L279 https://github.com/code-423n4/2023-10-ethena/blob/ee67d9b542642c9757a6b826c82d0cae60256509/contracts/EthenaMinting.sol#L162-L187 Vulnerability details...

7.2AI Score

2023-10-30 12:00 AM
2
talosblog
talosblog

How helpful are estimates about how much cyber attacks cost?

Coming from the newspaper and media industry, I'm no stranger to wanting to write catchy headlines. I'm certainly at fault for throwing together a story about so-and-sos house sold for X million dollars. But recently I've been wondering if those "big numbers" for cybersecurity are helpful at all,.....

7.5AI Score

2023-10-26 06:00 PM
12
thn
thn

YoroTrooper: Researchers Warn of Kazakhstan's Stealthy Cyber Espionage Group

A relatively new threat actor known as YoroTrooper is likely made up of operators originating from Kazakhstan. The assessment, which comes from Cisco Talos, is based on their fluency in Kazakh and Russian, use of Tenge to pay for operating infrastructure, and very limited targeting of Kazakhstani.....

6.7AI Score

2023-10-26 04:25 AM
29
securelist
securelist

StripedFly: Perennially flying under the radar

Introduction It's just another cryptocurrency miner… Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows. It comes equipped with a built-in TOR network tunnel for communication with command servers,....

7.5AI Score

2023-10-26 04:00 AM
41
talosblog
talosblog

Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan

Cisco Talos assesses with high confidence that YoroTrooper, an espionage-focused threat actor first active in June 2022, likely consists of individuals from Kazakhstan based on their use of Kazakh currency and fluency in Kazakh and Russian. The actor also appears to have a defensive interest in...

7.5AI Score

2023-10-25 12:01 PM
16
thn
thn

Malvertising Campaign Targets Brazil's PIX Payment System with GoPIX Malware

The popularity of Brazil's PIX instant payment system has made it a lucrative target for threat actors looking to generate illicit profits using a new malware called GoPIX. Kaspersky, which has been tracking the active campaign since December 2022, said the attacks are pulled off using malicious...

6.8AI Score

2023-10-25 09:13 AM
32
filippoio
filippoio

Why We Don’t Generate Elliptic Curves Every Day

With all the talk recently of how the NIST curve parameters were selected, a reasonable observer could wonder why we all use the same curves instead of generating them along with keys, like we do for Diffie-Hellman parameters. (You might have memories of waiting around for openssl dhparam to run...

7.1AI Score

2023-10-24 02:56 PM
13
impervablog
impervablog

Analysis: A Ransomware Attack on a PostgreSQL Database

In 2017, we reported on a database ransomware campaign targeting MySQL and MongoDB. Since then, we’ve observed similar attack tactics on a PostgreSQL database in Imperva Threat Research lab. In general, the attack flow contained: A brute force attack on the database for known users and weak...

6.8AI Score

2023-10-24 01:05 PM
18
thn
thn

34 Cybercriminals Arrested in Spain for Multi-Million Dollar Online Scams

Spanish law enforcement officials have announced the arrest of 34 members of a criminal group that carried out various online scams, netting the gang about €3 million ($3.2 million) in illegal profits. Authorities conducted searches across 16 locations Madrid, Malaga, Huelva, Alicante, and Murcia,....

6.4AI Score

2023-10-24 11:00 AM
35
securelist
securelist

Stealer for PIX payment system, new Lumar stealer and Rhysida ransomware

Introduction As a cybersecurity company, Kaspersky is constantly dealing with known and brand-new malware samples. As part of our crimeware reporting service, we provide our customers with technical reports on the evolution of existing crimeware families, as well as newly emerging ones. In this...

7AI Score

2023-10-24 10:00 AM
23
wired
wired

They Cracked the Code to a Locked USB Drive Worth $235 Million in Bitcoin. Then It Got Weird

Stefan Thomas lost the password to an encrypted USB drive holding 7,002 bitcoins. One team of hackers believes they can unlock it—if they can get Thomas to let...

7.1AI Score

2023-10-24 10:00 AM
49
thn
thn

Europol Dismantles Ragnar Locker Ransomware Infrastructure, Nabs Key Developer

Europol on Friday announced the takedown of the infrastructure associated with Ragnar Locker ransomware, alongside the arrest of a "key target" in France. "In an action carried out between 16 and 20 October, searches were conducted in Czechia, Spain, and Latvia," the agency said. "The main...

6.4AI Score

2023-10-21 01:10 PM
36
talosblog
talosblog

Threat Roundup for October 13 to October 20

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 13 and Oct. 20. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics,....

6.9AI Score

2023-10-20 07:38 PM
21
thn
thn

Unleashing the Power of the Internet of Things and Cyber Security

Due to the rapid evolution of technology, the Internet of Things (IoT) is changing the way business is conducted around the world. This advancement and the power of the IoT have been nothing short of transformational in making data-driven decisions, accelerating efficiencies, and streamlining...

7AI Score

2023-10-20 11:38 AM
30
thn
thn

U.S. DoJ Cracks Down on North Korean IT Scammers Defrauding Global Businesses

The U.S. government has announced the seizure of 17 website domains used by North Korean information technology (IT) workers as part of an illicit scheme to defraud businesses across the world, evade sanctions, and fund the country's ballistic missile program. The Department of Justice (DoJ) said.....

6.6AI Score

2023-10-20 05:12 AM
28
impervablog
impervablog

Database Ransomware: From Attack to Recovery

Introduction In recent years, ransomware attacks have risen sharply, due to their profitability, ease of access with ransomware-as-a-service (RaaS) tools, and an increasing attack surface. Ransomware is a type of attack in which the attacker locks and encrypts a victim’s data and then demands a...

6.8AI Score

2023-10-19 12:54 PM
9
thn
thn

Vulnerability Scanning: How Often Should I Scan?

The time between a vulnerability being discovered and hackers exploiting it is narrower than ever – just 12 days. So it makes sense that organizations are starting to recognize the importance of not leaving long gaps between their scans, and the term "continuous vulnerability scanning" is becoming....

6.9AI Score

2023-10-19 11:48 AM
43
wallarmlab
wallarmlab

What is The Dark Web ?

The Undernet, a term frequently shrouded in enigma and often linked with unlawful activities, is a concealed segment of the digital world that is purposefully veiled and unreachable via regular internet browsers. This chapter aims to unveil the secrets of the Undernet, step by step demythifying...

7AI Score

2023-10-18 04:14 PM
5
malwarebytes
malwarebytes

The US wants governments to commit to not paying ransoms

As the White House prepares to host its annual International Counter Ransomware Initiative (CRI) summit, Bloomberg reports that the US is pushing other countries to stop paying ransoms to cybercriminals. The CRI wants to enhance international cooperation to combat the growth of ransomware, and its....

6.9AI Score

2023-10-17 06:30 PM
8
thn
thn

CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks

The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that threat actors "interfered" with at least 11 telecommunication service providers in the country between May and September 2023. The agency is tracking the activity under the name UAC-0165, stating the intrusions led to...

7AI Score

2023-10-17 05:46 AM
27
oracle
oracle

Oracle Critical Patch Update Advisory - October 2023

A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches...

10CVSS

7.1AI Score

EPSS

2023-10-17 12:00 AM
118
thn
thn

Ransomware Attacks Double: Are Companies Prepared for 2024's Cyber Threats?

Ransomware attacks have only increased in sophistication and capabilities over the past year. From new evasion and anti-analysis techniques to stealthier variants coded in new languages, ransomware groups have adapted their tactics to effectively bypass common defense strategies. Cyble, a...

7.5AI Score

2023-10-13 11:07 AM
24
Total number of security vulnerabilities6253